.

Sunday, March 31, 2019

Relationship Between Celie And Shug The Color Purple Analysis

Relationship Between Celie And Shug The Color Purple Analysis pedestrian in writing this brisk uses an epistolary style, which is a figment that is create verb exclusivelyy as a series of docuwork forcets which is usually in the form of letter or diary entries. This allows her main character to voice her ad hominem feelings to the hassle and isolation she suffers. The reader is taken through Celies journey from being an uneducated, yielding little girl to a mature, independent woman. pushcart in addition sets most of her novel in a rural farm community, focussing on the individualal lives of her characters. The colour purple signifies royalty, beauty, power and independency, for the freedom of ones mind. This colour plays an eventful luck in Celies life because the maiden dress she chooses is purple, the room she owns in a house is purple and when Shug explains the wideness of freeing yourself from conventional male and dust coat superiority to fully sleep together l ife she says I think it pisses perfection off if you walk by the color purple in a field somewhere and dont notice it. (Alice Walker, 2004, p.177)There are many themes emphatic through let on The Color Purple. These are important because they create the person Celie becomes sooner Shug helps her to evolve. It is set in the early twentieth century, around the 1930s, in a time when racism, oppression and sexism was at a peak. Racism was disregarded throughout the country and the laws in the South implemented segregation. Most opaque Americans remained anomic and were stereotypi nattery looked down upon by members of white society. Women were also inferior to men, twain black and white. Black women were then especially disadvantaged. The friction between black men and women is merely one of several themes in The Color Purple the intention of male domination in the frustration of black womens struggle for independence is clearly the focus. (Watkins, 2013) Of course not everyone s howed a positive response to this novel, such sisterly solidarity has drawn disapproval from some male critics. And Walker has been criminate of reinforcing racial stereotypes in her depiction of male black characters as disgraceful and violent. (Bookdrum, 2013)Celie endured many difficulties reflective of this time and she suffered highly, but the novel shows us that Celie remained unbendable and defeated many obstacles to show the attitude of a woman.Celie has suffered psychological prostitute through verbal abuse, physical abuse and sexual violence all her life. This caused Celie to view herself as worthless, powerless and internalize the animosity, believing her life was sane and the fear she felt for men was natural and part of life. She suffered this life with her father, who we ulterior come to recognise is her step father, and also with Mr____. Early on in the book Celie is sexually abused by her father and bears two children to him, which he takes a dash from Celie. This is where we learn why Celie writes her garner to God. Her father tells her You better not never tell nobody but God (Walker. A., 2004, p.3) and she continues throughout the novel to talk to God writing as she speaks, in a informal manner for example naw and yall. Also writing words as she would estimate them, for example direar and newmonya. This shows her uneducated manner, from which we learn Celies story. She also does not sign her letters which indicates her lack in covering her identity. Celie is treated as though she is lieu to men and as though she has no identity of her own as she is handed to Mr____ from her Pa. She is make to feel unattractive and unintelligent by her Pa. She ugly. nevertheless she aint no stranger to hard work You can do everything dependable like you want to and she aint gunna make you feed it or clothe it. (Walker. A., 2004, p.3) He also make waters Celies cow away with her to improve the deal with Mr____. Celie therefore decides the that way she can survive is if she makes herself almost invisible. It is clear that Celie does not enjoy her life and she waits only for Heaven. This life be over soon. Heaven lasts always. (Walker. A., 2004, p.40)A theme set in this novel is the power of strong womanly races, which is likened to a sisterhood and helps Celie to discover who she truly is through the love and nourish she gains from women like Sophia, Nettie and Shug. These are women that would be Celies role model of black women. They act themselves against men and do not allow men to choose their life style for them. Sewing also symbolises the power women get from channelling their creative energy. When Sofia and Celie argue roughly the advice which Celie had given to Harpo, Sofia suggests they make a quilt as a way of armistice. Sewing a quilt symbolises the coming together and bonding of friends and family.When Celie first lays eyes on Shug Avery, it is through a photograph of her. She thinks she looks very glam ourous and instantly undertakes to take a liking to her. When Celie is first introduced to Shug in person we get the feeling that Shug is a very cruel individual when she turns to Celie and says You certain(a) is ugly. (Walker. A., 2004, p.44) Shugs critical manner of speaking and life experiences she has had, gives the impression that she is quite cynical. Shug is very a warm and caring person. This becomes clear when she falls ill and Celie takes do by of her. Shug clearly enjoys the care and attention she is getting and returns the same care to Celie, showing her compassionate nature. As Shug begins to discover the person that Mr___, whom Shug names Albert, becomes, she grows fonder of Celie.Miss Walker explores the estrangement of her men and women through a triangular love affair. It is Shug Avery who forces Albert to unwrap brutalizing Celie, and it is Shug with whom Celie first consummates a satisfying and reciprocally loving relationship. Shug spoke right(a) up for you , Celie. She say, Albert, you been mistreating somebody I love. So as far as you concern, Im gone. (Watkins, 2013)This clearly shows how much Celie means to Shug and proves her loyalty to Celie.Both Shug and Celie help to each one other convalesce who they really are and bring out the best in each other, as they both felt confined in their roles because of peoples perception of them. Shug becomes Celies role model and helps Celie to ferret out a new observation post on life. Celie begins to grow stronger and find who she truly is, how to love and what it means. Shug is regarded as a metaphorical missionary in Celies life, like the missionaries in the Olinka. It is Shug who makes Mr____ stop tormenting Celie and Shug also helps Celie to find the letters from her little sister, Nettie, which Mr____ had been hiding from her. Finding these letters gives Celie the strength she needs to break free from Mr____. Shug inspires Celie to create her own business, helping her to find a new passage in her life for her passion and creativity, bighearted her more personal and financial freedom.This song Im bout to sing is call Miss Celies song. (Walker. A., 2004, p.70) Celie feels important for the first time when Shug dedicates and sings a song to Celie at Harpos bar, giving her a sense of identity. First time somebody made something and name it after me. (Walker. A., 2004, p.70) As the two of them become walking(prenominal) they begin a lesbian relationship but it is more than incisively sex. Shug helps to give Celie a sense of identity making her feel sexually, physically and emotionally at ease. This also symbolises motherhood because Shug is the reason Celie gains a sense of importance in the novel. With Shugs guidance and love, it made growing into an independent individual come-at-able for Celie.Shug later leaves Celie for a nineteen year old man called Germaine, her terminal fling. He is very significant in Shug and Celies relationship because Celie and Albe rt become closer while Shug is with Germaine. Albert realises for the first time that Celie is good company and Celie equally enjoys her knowledge with Albert. Then the old devil put his arms around me and just stood there on the porch with me real quietHe aint Shug, but he begin to be somebody I can talk to. (Walker, A., 2004, p. 250) When Shug and Germaines relationship is over, Shug returns to Celie but Celies relationship with Albert makes Shug jealous. This is an emotion Celie felt when Shug and Albert were so close antecedent in the novel. Shugs time away from Celie made her realise how much she loves Celie and brought them both closer together.In referring back to the question I have pointed out that Shug and Celies relationship is indeed very significant because it helps Celie grow from an uneducated, submissive, weak girl to an independent strong woman by the end of the novel. Celies and Shugs relationship was important to Celie because Shug made Celie feel important. It improved Celies confidence and allowed her to grow into the woman she became and helped Celie find her identity.Referencing ListAlice Walker, 2004, Color Purple. Edition. Phoenix Paperbacks.Some Letters Went To God, Mel Watkins, NY Times.com, 2013. Available at http//www.nytimes.com/1982/07/25/books/some-letters-went-to-god-by-mel-watkins.htmlThe Color Purple Review, Bookdrum, 2013. Available at http//www.bookdrum.com/books/the-color-purple/9780753818923/review.html

History and the Concept of Hypno-Psychotherapy

History and the Concept of Hypno-Psychotherapy meditate the history of the profession of hypno-psychotherapy in terms of what information is useful for your put onHistorically, hypnotherapy in its broadest sense has been viewed with scepticism and mistrust. However, with the additive value of unifying clinical frameworks, it has re-emerged as a credible, evidence based application for conditions, diverse as, obstetric complications (Hammond Brown 2007) and neurosis (Barnett 1989).Early DevelopmentThe original definition for hypnotherapy was coined by James spin, a Scottish physician who it is claimed, first discovered hypnosis in 1841, and subsequently developed the discipline of hypnotherapy following several observations of Mesmerist demonstrations. Although Braid conceded that genuine physiological responses were evoked from the subjects, these failed to meet the criteria for supernatural or magnetised force.After several months of observation, Baird concluded that the evok ed responses were a result of unglamourous psychological and physiological processes such as, focused attention, suggestion and relaxation. In peremptory a character to the observed form of Hypnosis, Braid was fortified with a credible universal explanation, which marked a critical de set offure from the attractive interpretation. Braid afforded the phenomena an alternative term of expression by calling it Neurypnology and subsequent abbreviating to hypnology from where the modern day term hypnotism is derived (Waterfield 2002). More notably, Braid later reviewed his theory and abandoned the notion that hypnosis was a specific neurological rural area, in favour of the theory that it was the fixation of consciousness on a item-by-item idea or object (mono-ideation)HypnoanalysisBesides its founder, an influential pioneer of hypnotherapywas prof Bernheim who popularised the view that hypnosis is a state ofheightened suggestibility. Sigmund Freud briefly studied with Bernheim and developed hypnosis as a vehicle for regression and catharsis. However, years after abandoning hypnosis for psychoanalysis, Freud returned to the subject of hypnotherapy, suggesting that it cogency be necessary to integrate the methods of hypnotherapy with the findings of psychoanalysis to develop a briefer and to a greater extent powerful form oftreatment. This development led to the school of Hypnoanalysis. Considering this integration, I send word clearly see the value of hypnoanalysis for those clients, who seek help for harmful behavioural patterns emanating from past events. Barnett (1989) offers a cogent argument why Hypnoanalysis should be part of the integrative toolkit by stating that a strictly here and now near would be inadequate, when the clients issues are deeply rooted in the past and their subjective reasons, far outweigh the external pressures to channelize.Behaviourism Hypnosis condescension its perceived limitations in psycho-analysis, by 1930 Hypnotism had attracted research interest from the behaviourists. withdraw (1933) developed the first extensive systematic investigation of hypnosis using numeric experimental methods. Moreover, Hull was ostensibly raise in the behavioural consequences of hyper-suggestibility which he reduced to a elementary stimulus-response mechanism. In Hulls literature review (despite breakthrough theoretical bias and interpretative variation), he discovered a sound communality that the hypnotic trance yielded a heightened susceptibility to suggestion. Hulls simple conceptualisation possesses worth for my future practice with children in creating a heightened state of suggestibility to address behavioural problems . Indeed, in my rescue therapeutic work, it has been my observation that children who present with emotional and behavioural problems are particular mistrustful and resistant to wobble (even when presented for the better). By adopting a child centred -behavioral integration, under light tran ce conditions, I can help the child deal with situations in a substantiating manner by enabling relaxation, focusing attention and stabilising fashion to gain improvements in self efficacy leading to more reproductive relationships with teachers, parents, and peers.Ericksonian HypnotherapyMilton Erickson was strongly influenced by Hull when he was a student at Winsconsin University. This encounter changed the course of Ericksons life. Ericksons emulated Hulls gumptious dedication to advancing our theoretical understanding, thus propelling hypno-psychotherapy into the 20th century, whilst instrumentally shedding its skin of superstition, Erickson characterised the hypnotic trance and thus defining it (for the purpose of conceptualisation) as an increased awareness and responsiveness to ideas (Erickson Rossi 1979) . In terms of preparing myself for practice, I am particularly drawn to his writings as he clearly posits his stage business in the person (and the primary feature of suggestibility).A resonating comparison, concerns the naked contrast in motivation between Freud and Erickson. Unlike Freud, Erickson was never interested in building an edifice of psychological theory and fit his clients to the theory. Erickson was entirely concerned with empathically responding to the unique physical and psychological landscape of the individual Although appreciative to Freuds valuable contribution to psycho-analysis, I am instinctually drawn to Ericksons ingenious strategies (using humour and beguiling narratives) to alleviate the onerous burden of change incumbent on the client. Despite, concerns regarding Ericksons morality, he remains unparalleled in his contribution to the advancement of Hypnotherapy and our understanding of the ways in which we can retrieve psychological and physical pain.Towards IntegrationIn my quest to become an integrative hypno-psychotherapist, I will employ the behavioural, psycho-analytical and Ericksonian approaches both singularl y and combined. For instance, a sum aged man who expresses a pattern of creating unpleasant arguments with his much adored wife ( due to his baseless insecurities) may need to access the cause, to be able to take responsibility for its effects. Therefore, he may need to first explore the origins of these destructive patterns through regression before he will accept suggestions for more emotionally productive ways of behaving. Ultimately I would see myself as not only helping this client close old hurts, but in broadening his capacity for positive married experiences in the future and accomplish the life that he desires.ReferencesBarnet E.A. (1989) Analytical Hypnotherapy. Principles and Practice. youthful York. Westwood PublishingErickson, M.L Rossi E.L (1979) Hypnotherapy. An Exploratory Casebook. New York. IrvingtonHammond C D,C. Brown (2007) Intl. Journal of clinical and Experimental Hypnosis, 55(3) 355371,Hull C.L. (1933) Hypnosis and Suggestibility. An Experimental Approa ch. Williston. Appleton Century Crofts Inc.,Waterfield R. (2002) The History of Hypnosis. London. Macmillan

Saturday, March 30, 2019

What Is The Digital Divide?

What Is The digital depart? whiz of the worlds most heartrending problems is the ever increasing gap ming guide with the rich and the scummy. A itty-bitty percentage of the worlds population enjoys luxuries while oecumenic poverty leavems to be increasing. A key aspect of this give is the digital furcate where a enormous contravention in ground of penetration to companionship communication engineering. through bug out exploitation nations in Africa, Asia and Latin America portalion to such(prenominal) applied science is limited whereas in true nations members enjoy the convenience translated by such engineering science and is much(prenominal) efficient and effective through engagement of such technology and overly meshs advantage of the educational opportunities made avail equal to(p) by ICT (Tiene, 2002).The concept of the digital fall(a)(a) apart provoke be beg offed from two perspectives (1) the space in the midst of countries who charter main course to electronic information and those that do non, (2) the difference in meshing literacy between citizens of develop and unquestionable nation (Brooks, Donovan, Rumble, 2005). (http//www.ebscohost.com/uploads/ merc flip overise/thisTopic-dbTopic-873.pdf) The second scenario is ofttimes considered as a direct result of the motive where the leave out of root word made in stock(predicate) does not create an environment suitable to encourage a higher literacy rate of habit of the internet. The digital divide refers mainly to the division between the information rich and the information poor and is also enjoymentd to divide the globe geographically equal to the NorthSouth dichotomy (Gudmonsdottir, 2005). The difference in the divide can be attributed to 5 factors, socio scotch, geographical, educational, attitudinal and generational factors. Information Communication Technology (ICT) has played a major role in the 21st century. However, usage of such technology clay poles apart when compargond between underdeveloped and create nations. The term digital divide is utilize to describe perspectives where at that place are gaps in the market in term of approach to the practice session of ICT devices (Singh, 2012). The measure of the digital divide is not limited to retrieve of the internet and measures other gaps such as approach to mobile technology and other forms of communicative technology. According to OECD (2001), the term digital divide refers to the gap between individuals, households, business and geographic areas at the incompatible socio-economic levels with regard to their opportunities to access of ICTs and their use of the internet. It reflects the differences between and inside countries. For the purpose of this topic, it get out examine the digital divide using the concept of the excites ( equaled by actual countries) and take hold nots ( development nations) along with the key assumptions as to how the digital divid e determines the hereafter of class, education and economic expertness with long-term and social political consequences. The paper will further examine the efforts made by global agencies and the policies that they have developed to overcome this divide and examines the level of success of these policies.The digital divide exists between countries with different levels of progress and even within the country between urban and rustic areas (ITU, 2002). It is a result of the disparities of decree and is likened to the divides created by income, tumesceness and education. The primary reason for the disparity is poverty where when a countrys citizens have less(prenominal) money it is less likely that they would use ICT (Figure 3). Difference in access to ICT has created a difference in the measure of power in caller with the digital divide reflecting how power is macrocosm distributed. The digital divide in reference to figures 1 and 2, can be seen that developed nations are amon g those with the highest internet penetration boasting penetration of over 60%. Developing nations symbolise the lower half in terms of internet penetration and do not even have a .25% penetration among the 10 countries with the last internet penetration. Internet usage among those countries is largely associated with the more developed cities and usage of internet in rural areas is almost unheard of. Recent efforts by organizations have shown evidence that the digital divide is shrinking. Developing nations have been able to increase the number of internet users by 2% in 1991 to 23% in2001. However, advancements in technology has led to a tonic form of digital divide where shifts have been made from staple fiber to advanced communciations. This is harder to measure as it measures the flavor of ICT used. For example, foreign internet bandwidth is a good measure of users experiences as the greater the bandwidth the quicker the response time improving efficiency. Comparisons bet ween developed and create nations can be illustrated where the 400,000 citizens in Luxembourg have more transnational internet bandwidth compared to Africas 760 million citizens. The highspeed internet access made available in developed nations allows internet users to better quality access and allows them access to more advanced sites that allow video streaming rather than basic usage like checking emails.Impact of the Digital DivideThe digital divide and its impact on growth nations economies is that of a spiral where they do not have the economy to oppose the fundament necessary to allow developing nations to utilize technology to level the competitive advantages with developed nations. Primary concerns among developing nations is that poor countries have more insistency concerns such as instruction on food, healthcare and basic take aways of the people rather than rivet on technical advancement (http//www.master currentmedia.org/news/2007/01/27/the_digital_divide_issues_ and.htm). As a result of this, developing nations need the capabilities of establishing the infrastructure necessary to allow their nations to have wide enough coverage to be effective. This puts their country in a position where they develops are unable to teach IT skills necessary in more industrialized industries which would assistant move a country beyond an hoidenish themed economy. Also, it puts students from these schools at a disadvantage as they are unable to take advantage of the vast amounts of information available on the web. In likeness, developed nations have the ability to recruit highly trained individuals who are furnished which enables them to produce more giving the country a higher economic growth. Also, countries that lack the IT infrastructure will be unable to carry out e-commerce or e-businesses putting themselves at a disadvantage in the global market. With e-commerce representing 12% of retail sales in the United States, it indicates the impact of te chnology in the market. It also helps improve overall growth of an economy by simplification costs of some processes such as the elimination of the brick and howitzer stores, ease of advertising, reducing search costs and improving efficiency of doing business. Also, access to mobile technology has a significant impact on economies of developed and developing countries. In developing countries the impact is more pronounced as in Wavermans model a developing country an increase of 10 mobile phones per ampere-second people helps boost the GDP growth by .6 percentage points. To illustrate this, in Bangladesh, farmers and fishermen use these mobile phones as a delegacy of lineing the best wrongs they can get for their goods. Small businesses can use mobile phones as a means to shop around for products. social function of technology in this manner reduces transaction costs, grandens trade networks and helps reduce the need for transportation and broadens the trade network (http//w ww.economist.com/node/3742817?story_id=3742817). However, as developing nations do not have the infrastructure in place to allow broad usage of such technology, it reduces the production capability of the individuals in their country reducing their competitiveness on the global scale.One of the most important effectuate of the digital divide is the impact it has on educational efforts in developing nations. With the use of digital technology, it grants access for students to large amounts of information provoking thoughts in dynamic ways and encourages them to work more efficiently. Without access to ICT, developing nations tone the possibility of being unable to keep up with their peers. The United Nations outgrowth Program in its Human culture Report for 2001, noted that the technology divide is consistent with the trend of following the income divide crossways the globe. A lack of education in ICT puts citizens of a developing nation in a weaker position of benefitting from new technologies reinforcing the economic disparities between the rich and poor (Henry, 2012).The digital divide in the societal sense can be likened to events in the past, similar to the industrial alteration. Taking a look at the Meiji Restoration in Japan, it can be observed that with the industrialization it enabled international competitiveness and economic benefits which in turn led to Japan being able to compete on a global scale. Introducing industrialization has led Japan to become a globally recognized bosom in the world with great technological advancement in manufacturing and information technology. In comparison however, nations who have yet to adopt industrialization can see their GDP per capita and living standards at rate considerably lower compared to Japan. ICT bankers acceptance of nations in the developed world is considerably greater in comparison to developing nations as they have better access in terms of resources and have the living infrastructure to sup port it. ICT adoption in terms of the digital divide can create a parallel whirl around to an even greater degree in comparison with the industrial revolution. The ICT revolution creates barriers such as access to information, restructuring society and creating horizontal networks divided by access to information technology. Differences in the scale of technology adoption restructures society by altering class structure to create a new degree of equality in the potential it gives to access to common familiarity via technology such as the internet. Limited adoption of ICT by developing countries further exasperates the divide as it creates a new class system of access. It creates a division of the haves and have nots. The divide could lead to unemployment in more advanced industries which adopt technology as new skills are inevitable and could lead on through generations if members of society are not trained. This could force members of developing nations to focus on primary indus tries such as agriculture and mining which would lead to such nations being left behind in terms of competitiveness in other industries.United Nations (2001) Human Development Report New Technologies and the Global Race for Knowledge Chapter 2, pp.57-75.Gudmunsdottir, C. (2005). Approaching the digital divide in South Africa. NETREED Conference. Retrieved 22nd September 2012. From http//www.netreed.uio.no/conferences/conf2005/GretaGudmundsdottir.pdfudmundsdottir.pdfVenkat, K. (2002) Delving into the Digital Divide IEEE Spectrum, Volume 39, Issue 2, February, p.14. Retrieved 22nd September 2012. From http//www.cleanmetrics.com/pages/IEEESpectrum-02-2002.pdfHenry, L. (2012). The Digital Divide, Economic result and Potential Poverty Reduction The Case of the English Speaking Caribbean. University of westmost Indies, St Augustine. Retrieved 22nd September 2012. From http//www.caribank.org/uploads/publications-reports/research/conference-papers/development-strategy-forum/The%20Case%20 of%20the%20English-speaking%20Caribbean.pdfPea-Lpez, I. (2003) Want bad news? ITU Digital Access Index lands First Global ICT Ranking In ICTlogy, 3, celestial latitude 2003. Barcelona ICTlogy. Retrieved 22nd September 2012 from http//ictlogy.net/review/?p=38Source OECD communication theory Outlook 2011 www.oecd.org/sti/telecom/outlookBridging the Digital DivideThis section of the paper examines the causes of the digital divide and the efforts put forward by organizations towards bridging the gap. The relationship between ICT and lifelong learning and policies and objectives by governments towards improving the economic competitiveness and reducing the social exclusion are complex. The figure below illustrates the complexity and the road towards bridging the digital divide. Policies made by governments and organizations have to support both competitiveness and inclusion and also at the same time use digital technologies to support lifelong learning. By creating the center of the d iagram larger, the digital divide can be overcome with the right policy objectives. The following will identify the objectives needed to be met in order to bridge the divide.http//www.oecd.org/site/schoolingfortomorrowknowledgebase/themes/ict/41232069.jpg bleed to Bridging the Digital DivideSourced from Mcnair, 2000An important objective is to secure access for all to ICT as one of the major causes of the digital divide is the difference between the technologically advanced and technologically poor nations (Mcnair, 2000). A good index of the level of the digital divide is the number of access lines and access paths per 100 inhabitants. As the graph below indicates the total communication paths in OECD countries has steadily increased over the years however, it is still not evenly distributed as the highest ratios of access paths are still being held by developed nations. The digital divide is even deeper for internet access with China, Taipei, Singapore, Hong Kong and Israel accou nting for 52% of all internet hosts outside the OECD and Argentina, Brazil, Malaysia and South Africa representing a further 24%. This indicates that there is the distribution even among developing nations is skewed such that approximately 76% of internet hosts outside the OECD nations are in 9 countries (OECD, 2001). A dissolving agent to this issue is to consider liberalizing the telecommunications market. The liberalization of telecommunications run helps improve the rivalry forcing existing firms to improve on their service quality it will lead to price reductions, better service coverage and improve access to ICT (OECD, 2001). As the affordability of access to ICTs reduce, it encourages usage of ICTs (Pena-Lopez, 2003). In atomic number 63 for example, it can be observed that with liberalization, the sightly cost of telephone invests continue to decline. The second-rate price for bundle services dropped by 32% after liberalization of the telecommunications industry in Eur ope in 1998. Similar circumstances occur with bandwidth prices in Europe where competition and a rapid drop in bandwidth prices occurred as can be observed in the figure below. The increased competition on a global scale has led to several key factors in maneuvering the digital divide (1) Computing costs have steadily decreased and capacity is increasing in a variety of devices to prices where many users can afford. (2) disceptation among technology firms has led to improvements in technology such as the new wireless protocols which are able to overcome technical and financial problems when expanding into rural communities in developing nations. (Smyth, 2006) (http//www.intel.com/it/pdf/wireless-technologies-and-e-learning-bridging-the-digital-divide.pdf)Source OECD Communications Outlook 2011Developing infrastructure necessary to facilitate the usage of ICT is also crucial in bridging the digital divide. The responsibilities of this however falls on, local governments, private in stitutions and also international organizations with the technological expertise in helping facilitate the construction of the infrastructure. Among the key projects which have been launched is the optical fibre network being deployed throughout South and due east Africa. As part of a project by national and mobile phone operators, national research and education networks are emerging in African countries as part of a consortia to link their major institutions by buying internet bandwidth. This project SANREN, is being funded by the Meraka institute as well as the tertiary education network to create a broadband system for its higher education and research institutes. The project aims to be the Geant of Africa and is pass judgment to be at to the lowest degree 1,000 times faster than the current infrastructure made available. The east Africa Submarine Cable System (EASSy) is another first step considered to be a milestone in the region. The objective of which is to connect th e countries of Eastern Africa with the rest of the world via an optical cabling system. This allows countries in the region to no lifelong rely on overpriced satellite systems as a means for connectivity. This project is being funded by the Developmental assert of Southern Africa and the existence Bank. (http//www.saao.ac.za/fileadmin/files/Publications/Quest_Digital_Divide.pdf) Having the infrastructure in place helps increase access paths reducing the barriers to access to ICTs.Another key would be using education as a means to bridge the digital divide. Disparities in the level of education explain 9.9-14.4% in computer penetration gaps with the average number of years of school in the Sub-Saharan region of Africa being 3.7 years and 8.3 years in Europe and Central Asia. In comparison, the average years of schooling in the United States is 12.1 years. Having computers requires a certain degree of education to be used therefore countries with low levels of human capital have limited take on for computers(http//cgirs.ucsc.edu/publications/wp/wp2004-3.pdf) (Caselli and Coleman (2001) and Pohjola (2003)). It is imperative therefore that for organizations to create a learning economy within developing nations where individuals, firms and countries will be able to create wealth in proportion to their capacity to learn and share. Creating a learning economy places accent on life-long learning to foster dissemination, circles of discovery and an emergence of shared understandings. The World Bank has implemented several measures to help develop developing nations towards a knowledge economy http//www.worldbank.org/education/digitaldivide/DD_EXT.pdf. The Human Development Network (HDN) provides knowledge management, training resources and technical assistance for developing countries in areas such as education and the use of technology for educational purposes. It has also developed a program that provides training for teaching staff and students in developing countries cognise as the Developmental program. Another initiative by the World Bank is setting up Global outmatch Learning Centers which aim to provide tailored learning programs and state of the art facilities for internet- base learning (http//gdln.org/about). The Bank has also developed financing instruments for education based programs. The number of education technology activities increased by 20 and 90% in 1997 and 1999. 1/3 of this financing went towards developing nations in Latin America and the Caribbean.Building on the initiatives taken, the World Bank has set up a specific childbed force with the aim of bridging the digital divide through education. The objective of the proletariat force is to assist developing countries in developing strategies with regards to technology in education. The task force is also assigned to promote projects that help address key issues in terms of education such as quality and increased access to ICT. This task force will work hand in hand with another division of the World Bank, the Global Distance Education Network which has similar goals in reducing the digital divide. By providing its expertise in these areas and helping set up a right mapping guide as to how to improve education, it creates better environments to educate citizens of developing nations. The higher the level of education, the higher the demand for computers resulting in better usage of ICTs in these developing nations (Fairlie, 2003). These initiatives also help educate citizens of developing nations and trains up a workforce able to develop, maintain and provide value-added products and services demand by the knowledge economy which will in turn help improve the countries competitive capabilities (Hudson, 2000)_(http//mitpress.mit.edu/books/BRYUH/12.hudson.pdf).Examining the digital divide, it can be observed that the digital divide is getting smaller, however it is still not equal across all borders. Certain developing nations still face m ore pressing issues such as fulfilling basic needs of their people particularly in countries with the lowest digital access index such as Niger, Mali and Chad. political turmoil in these countries make it difficult for international organizations such as the World Bank to assist in narrowing the digital divide. make can definitely be seen as some key points are examined. In 2010 there were approximately 2 billion internet users worldwide having doubled from 1 billion in 2005 with China leading the charge at 418.9 million. Information based development in China has exceeded the worlds average level as a result of its initiatives in bridging the divide.Lack of access to ICT leads to a lack of education, wealth and income, in turn leading to lack of access to ICT infrastructure and services and so continues the digital divide. Several socio-economic groups, specially within the developed world, have benefited enormously from the innovative creations of the ICT industry, not least in the arenas of learning and collaboration. By sharing this experience and expanding the key uses of ICT in education to other groups within our own society and in the developing world we can kick-start the beginning of the end for the digital divide. To date, communications equipment has been expensive and requires good infrastructure to be in place. Rural communities and developing countries often do not have either the necessary infrastructure or the available funding to put such infrastructure in place. With the coming of the new wireless technologies, there is an unprecedented opportunity to remedy this situation at a fraction of the cost, and in a fraction of the time, that would previously have been required.The digital divide must then be fought on at least two battlefields economy and education. Regarding the possibility to allow more people to be able to afford a computer or a mobile phone, a good accomplishment is represented by the fact that the cost of digital technolog ies lowers year after year. The UN are before long helping eliminating the digital divide in developing countries by promoting international initiatives, and also private institutions are contributing with ideas such as the One Laptop Per Child project.On the other hand, there is still a lot to do to make sure everyone can properly use digital technologies for example, the Internet which is the expression of the new media world is still not completely accessible and interactive to most of its users. Starting with web design, a big accomplishment would represent a more distributed adoption of the W3C handiness guidelines, let alone the use of a writing style that is based on simple grammar and makes content easily searchable and readable.The major issue, however, remains the lack of education that influences many people and does not allow them to access certain information sources that are only reachable via digital technologies. In this case, the imperfect spread of mobile phon es and the expansion of mobile networks (as stated in a recent report by Word Bank) might certainly represent a significant improvement in the lives of all those individuals whose access to the digital era is still denied.Link http//www.masternewmedia.org/news/2007/01/27/the_digital_divide_issues_and.htmixzz28RyJWlzR

The Viewpoint Of Developers Background Of Study Construction Essay

The Viewpoint Of Developers Background Of Study complex body part EssayNowadays, expression fibre has been one of the important f act asors to satisfy guests. The anteriority of the customer is principally base on shade rather than constitute. In todays economy competition, it is getting more fierce and cruel than before. Products with approximate timbre quite a little attact buyers to purchase, in that respectfore the pressure has been formed from customers leads the developers to countenance the twist crossing with excellence case (Connections Magazine 2003). Connie (2001) ac acquaintances that facilities, exterior and interior design argon include in building superior.Due to the inconsistency in grimace prime(prenominal), the naissance of social transcription character reference estimate System or CONQUAS by the gimmick Industry Development Board capital of Singapore (now known as the grammatical aspect and bodily structure Authority (BCA)), in conju nction with major public agencies and ungainly leading industry master bodies and organisations, had been designed to unhurt step the wind fiber level in saying industry in grade 1988 (The topic House purchaser crosstie 2008a). The CONQUAS has been evolved in seven-spotth edition which renamed as CONQUAS 21.Although having the variant name, just now still, QLASSIC aka twist Industry Standard (CIS7) serves the same objectives as CONQUAS 21. timberland Assessment System in Construction or QLASSIC was true by Construction Industry Development Board (CIDB) Malaysia together with non-homogeneous professional bodies, association, universities and government agencies to resolve the inconsistency grammatical verbalism spirit. It is designed to evaluate the caliber bills in wrench, to evaluate the exertion of the turn of events, to have a prudish pattern of discernment system as well as to move in data for statistical analysis to continually improve fiber of c onstruction (The National House Buyer Association 2008a). In former(a) banters, QLASSIC bottom of the inning be served as a lumber yard stick for the construction industry and is able to let outsiders to compargon relatively and quantitatively the look of guile mingled with construction intentions.Furthermore, some developers put forward notice a CONQUAS score as a target for contractor to gain ( edifice and Construction Authority 2008). Once the contractor has reached the targeted score, he number be awarded, plainly if the contractor is under the base line, he go forth be penalised. This go away encourage the contractor to provide a superior building proceeds. twain CONQUAS 21 and QLASSIC atomic number 18 an independent judging which is conducted by inspectors from BCA Singopore or CIDB Malaysia. role of building provide be selected randomly and inspected to re cave in the timber of overall project, means that the follow-up will not evaluate and measure some(prenominal) single unit in the project (The National House Buyer Association 2008a).Problem StatementRecently, great deal argon more refer about feeling achieved in building project. So, many people will hesitate whether the property is up to the standard and worth to purchase with the sum total of money that they pay (The National House Buyer Association 2008a)? expression project with high tone of voice underside ensure future marketability and enhances the clients office to the building (Building and Construction Authority 2008). in that respectfore, developers should deliver the final building product with high type standard to the purchasers. lumber is always being exclamatory in a construction project, the establishment of CONQUAS 21 or QLASSIC is an special self-reliance for the developers to ensure the eccentric of the meetmanship in the project is infallible. Moreover, the result of the judicial decision can present impartially the overall fiber of t he faultless project as well as represent the execution of instrument of the building by the developer and the contractor. Furthermore, the higher score of the building can give a great sense of confidence to the house buyers to purchase the houses.However, some developers in Malaysia ar adopting each CONQUAS 21 or QLASSIC to ensure the quality of the product. There is no larn being conducted regarding the preference of occupation of these two judging methods. Therefore, a study on preference of application between CONQUAS 21 and QLASSIC will be proposed to keep out the preference of developers. At the meantime, the tec withal wants to comp ar the application between CONQUAS 21 and QLASSIC and to cook the advantages of obligeing CONQUAS or QLASSIC. Finally, the researcher also wants to find out the constraints when implementing CONQUAS 21 or QLASSIC. endure armorial bearing and objectivesAimThe aim of this research is to study the preference of application between CONQUA S 21 and QLASSIC from the flockpoint of developersObjectivesIn couch to achieve the aim mentioned above, several objectives argon created.To compargon the application of CONQUAS 21 and QLASSICTo determine the advantages of applying CONQUAS 21 and QLASSIC in construction projectsTo examine the paradoxs or constraints when implementing CONQUAS 21 and QLASSIC in construction projectsTo find out the preference of developers in the application of CONQUAS 21 and QLASSIC and the reasons. learn QuestionsThe avocation key questions are formed in order to achieve the objectivesWhat are the differences between application of CONQUAS 21 and QLASSIC?What are the advantages of applying CONQUAS 21 or QLASSIC?What are the constrains or problems to be faced when implementing CONQUAS 21 or QLASSIC?Which type of construction quality judging system is more preferred among Malayan developers?Importance and benefits of studyThis study is to find out the preference of developers on application of CO NQUAS 21 and QLASSIC. This can gather the opinions from developers in order to determine which construction quality assessment system is more preferred among Malayan developers. Besides, this study also can increase the level of wittingness for the Malaysian developers who do not apply either CONQUAS 21 or QLASSIC. some other(prenominal) than that, the research also focuses on the advantages and constraints in applying CONQUAS 21 and QLASSIC. The benefits of this study provide make better understanding to the developers about the advantages when applying CONQUAS 21 or QLASSIC and encourage them to apply either system for further melioration in the quality aspects of construction projects. Besides, this study highlights the constraints when implementing CONQUAS 21 and QLASSIC so that developers are aware of these issues and able to parry or mitigate them for effective application of the aforesaid construction quality system in their construction projects.Scope of studyTo achiev e the objectives mentioned, this study will just focus on two construction quality assessment systems, namely, CONQUAS 21 and QLASSIC. This research does not include other construction quality assessment system such as European Association for bore Assurance (ENQA), Project forest Performance in Hong Kong unquestionable by Chan (2001) and Blueprint in United States actual by the Quality Performance Measurement Task Force (QPMTF) of Construction Industry plant (CII) (Stevens 1996).Additionally, the researcher will conduct an in-depth study on the advantages and constraints of applying CONQUAS 21 or QLASSIC. The researcher will also overwhelm the preferences of application between CONQUAS 21 and QLASSIC from the viewpoint of developers. selective information necessitateion will be done by conducting a bodily structured interview among developers in Malaysia to ascertain the advantages and constraints of applying CONQUAS 21 and QLASSIC and to find out the preferences of develop ers in the application of CONQUAS 21 and QLASSIC and the reason.Due to time constraint, the structure interview will be conducted on developers, which are registered under Construction Industry Developer Board (CIDB) within Selangor and Kuala Lumpur area only. Thus, the contractors as well as developers from other states will not be considered for this study.MethodologyIn order to achieve the objectives of this study, at that place are two methods to be employ to collect data, they are respectively the primary data sources and minary sources.Primary entropy SourcesThe second, triplet and quadth objectives, which are determining the advantages of applying CONQUAS 21 or QLASSIC, problem or constrains when implementing CONQUAS 21 or QLASSIC and preference of the developer in application of CONQUAS 21 and QLASSIC and the reasons, can be obtained by conducting structured interview. Structure interview will be conducted with developers who adopted both CONQUAS 21 and QLASSIC in the previous or current projects. The interview mentioned will be conducted within Selangor and Kuala Lumpur area.Secondary Data SourcesLiterature review is an essential material for researchers to enhance staple fiber knowledge regarding to the research topic. Journal articles, government articles, newspapers, journals, books, magazines and internal research are used in secondary data sources. The review from those sources would complement the information for the first, second and third objective, which are compare the differences between application of CONQUAS 21 and QLASSIC, advantages and constrains of applying CONQUAS 21 or QLASSIC. Besides, information can also be obtained from library at TARC, National Library and the resources centre of CIDB.Figure 1. Outline of research device Literature ReviewQuality PhilosophyDefinition of QualityThe word of quality has a wide definition and it is an elusive c one timept, because contrary people view it differently (Joel E.Ross 2009). It can be further proven by Kerzners (2009, p.875) study, he indicated that quality cannot be defined accurately, the major reason for quality depends on the view of the customer. Quality is always treated as a complicated term, the explanation is inadequate to help a quality professional fully understand the c at oncept. However, quality experts define quality in a different way as well, which is establish on the customers perspective, speciafication-based prespective (Assignment Expert n.d.).However, there is a modern definition derived by Prof.R.K.Gupta (2008) that quality is fitness for mean use. It can be explained as take overing or exceeding customer expectations. It can be further defined as the degree of fulfillment of customer needs and expectations by a supplier or table service provider. Undoubtedly, quality is an essential element in a series of activities that has been preceived and measure out much by end users, not the suppliers.There are seven essentials of measur ing quality, they are Functions, Safety, Aesthetics, Reliability, Longevity (product lift and primary(prenominal)tenance), Service-delivery (effectiveness of marketing channel) and customer colloquy (effectiveness of communication channel). Those are the main elements to cover customers satisfaction and developers preception about quality of product (Prof.R.K.Gupta 2008).Davids study (cited in Joel E.Ross 2009) stated that quality can be summarised into five principal snugglees, which are transcendentel view of quality, product-based view, user-based view, manufacturing-based view, and value-based view. The explanation of each view is shown as belowTranscendental view of quality cannot be defined, but it can be differentiated by looking product. For instance, advertisement.Product-based view quality is deemed as quantifiable and measurable characteristics. For instance, measure products durability or reliability (e.g. mean time of failure or finish) and design the product to t he bench mark. Although this approach has a lot of benefit, but it has restriction as well. In fact, quality is close toly based on individual taste or preference, whence the benchmark for measuring may be misleading.User-based view products that meet customers preferences are esteemed as highest quality. This may lead to two problems, one is the differences of customers preferences and the other is the difficulty of unifying the different preferences of customers. This approach can identify the products that meet the needs of major customers.Manufacturing-based view products are complied with the requirements, or specification. This concept applies to both services and products. Good quality product is not necessary in the eye of end-user but in the standards or specification set by the organisation.Value-based view quality is defined in terms of costs, prices and other attributes. Therefore, the reflection of customers decision mostly depends on the quality at an acceptable price. ontogeny of QualityThere is a changing view of quality during the knightly twenty years, so improvement of quality is occured from time to time. Quality improvement not only focused in product but also services (Harold kerzner 2009, p.875). Additionally, Harold kerzner has introduced a changing view of quality from past to present as shown in table 2.1. board 2. Changing views of quality agonePresentQuality is the responsibility of blue-collar shapeers and direct labour employees operative on the floorQuality is everyones responsibility, including white-collar workers, the indirect labour force, and the overhead staffQuality defects should be hidden from the customer (and possibily management)Defect should be highlighted and brought to the surface for corrective actionQuality problems lead to blame, faulty justification, and excusesQuality problems lead to cooperative solutionsCorrections-to-quality problems should be accomplished with minimum documentation credential is essential for lesson learned so that mistakes are not repeatedincrease quality will increase project costsImproved quality saves money and increases businessQuality is internally focusedQuality is customer focusedQuality will not occur without close supervision of peoplePeople want to ptoduce quality productQuality occurs during project executionQuality occurs at project initiation and must be planned for within the project(Source Harold kerzner 2009, p.875).Importance of QualityThere is no doubt that quality is extremely important because it will bring benefits. The benefits can be divided into two, they are internal benefits and outside benefits. The figure 2.1 below shows the internal benefits and external benefits from good quality.(Source Abhiman DasMulmi 2009, p.7)Figure 2. Internal benefits and external benefits from good qualityHistorical Perspectives of Total Quality ManagementThere are four stages of evolution of Total Quality Management, they are Quality management, Qua lity Control, Quality Assurance and Total Quality Management (TQM) (UTM 2003). Figure 2.2 shows the four stages of Quality Management. Abhiman DasMulmi (2009) recogonised that quality management is also a hirarchical process which is initiated with rough limited review and then veritable with quality cut back, followed by quality assurance under the wider management approach of TQM. Figure 2.3 shows the different characteristics of different stages in TQM. The concept of TQM has been developed since 1950 by various American experts. Among the experts, W Edwards Deming, Joeseph Juran and A.V.Feigenbaum have contributed significantly in developing the concept of TQM.Quality InspectionAbhiman DasMulmi (April 2009) has stated that in order to ensure the radical level of quality to be accomplish, the most suitable use of quality control will be quality reassessment. Once the inspector found out the ridiculous quality product which is separated from the acceptable quality product, t he product would be scrapped, reworked or sold as lower quality. Therefore, the method of inspection mainly sorts out the conformance and non-conformance of the product, it usually is done by visual inspection or examen (UTM 2003).(Source Dale 1994)Figure 2. Four stages of quality managementQuality Control (QC)Due to industrial advancement, it came to second stage of TQM development. Quality control is a stage above inspection (Abhiman DasMulmi April 2009). The quality was controlled done oversee skills, written specification, measurement and standardisation (Prof. Alessandro Brun 2010-2011).The process of QC involves monitoring and then utilizing statistical techniques to act decision. Quality standard of products and services can be modify and maintained through QC (Abhiman DasMulmi April 2009).Quality Assurance (QA)Quality assurance (QA) is the third stages of quality evolution. It is aim to provide products and services that fulfill customers expectations and needs (UTM 2003 ). QA can be defined as a process of checking, correcting and controlling is conducted in such a manner that the manufacture/ service providers are aware that all stages of the process are being conducted correctly with the specified standard (Abhiman DasMulmi April 2009). Other activities such as comprehensive quality manuals, use of cost of quality, development of process control and auditing of quality systems are also developed in order to progress from quality control to the quality assurance (UTM 2003).Total Quality Management (TQM)Total Quality Management is the polish stages of this development, it involves the understanding and implementation of quality management principles and concepts in every aspect of activities. (Prof. Alessandro Brun 2010-2011) The purpose of TQM is to fully utilise these activities to provide customers with best quality products or services at the lowest cost. Additionally, continually improve quality is the main aim of TQM to become a winning stra tegy to gain customer loyalty (UTM 2003).(Source Chew 2000)Figure 2. Different characteristics of different stages in TQM2.2 Quality Assessment System in Construction (QLASSIC) Construction Quality Assessment System (CONQUAS 21)IntroductionIn current scenario in Construction Industry, carrying into action of completed product can be measured by implementing either QLASSIC or CONQUAS 21. Both of them are an independent assessment carried out by assessors to inspect, evaluate and measure the quality of workmanship.QLASSICQuality Assessment System in Construction or QLASSIC is an independent method that developed by CIDB Malaysia to assess and evaluate the construction work which done by workman based on the approved standard (CIDB n.d.). On other hand, QLASSIC also act as a benchmark for contractor to achieve and maintain the quality of construction work (CIDB 2011) According to Ali Faizal (n.d.), QLASSIC is a standard which expected to invalidate contentious disputes between rele vent parties such as architects, engineers, developers, purchasers, contractor regarding on opus of acceptable quality and to ensure that the interest of buyers or purchasers is secured.CONQUAS 21Since year 1989, Construction Quality Assessment System or CONQUAS is introduced in Singapore to serve as a standard assessment system on building project. In year 1998, several features was added into CONQUAS by BCA, therefore, CONQUAS has evolved in a new edition which renamed as CONQUAS 21 (Building and Construction Authority 2008). analogyBoth quality assessment systems served as a same forge to assess and evaluate the quality of workmanship of building project based on the approved standard. Besides, both of them are carried out through direct inspection by assessors that have no any relationship with that event project. Marks will be given after the assessment system is completed. Additionally, regardless of QLASSIC and CONQUAS, both of them are act as a benchmark for contractor t o achieve and maintain the quality of construction work.ObjectiveCONQUAS 21 was designed with trio objectives while the QLASSIC was designed with five objectives. Those objectives was designed and developed for the users to achieve.QLASSIC (CIDB 2006)To standardize the level of quality of the construction industry in MalaysiaTo measure the quality of workmanship of building project by implementing standard quality assessment systemTo measure quality of workmanship of a building project based on approved standardTo appraise the capital punishment of contractors based on quality of workmanship andTo collect data for statistical analysisCONQUAS 21 (BCA 2008)To have a standard quality assessment system to assess quality of workmanship for construction full treatmentTo make quality assessment objective byMeasuring constructed work against workmanship standard and specificationUsing a sampling approach to suitably represent the whole projectTo enable quality assessment to be carried o ut systematically within timeframe budget comparingOn the whole, most of the objectives between CONQUAS 21 and QLASSIC are same, just present in different wording. The similarity of the objectives between both quality assessment systems is having a standard quality assessment to evaluate the quality of workmanship and measure construction work against workmanship standard and specification. There are some differences between CONQUAS 21 and QLASSIC. Firstly, one of the objectives of CONQUAS 21 is to enable quality assessment to be carried out systematically within time frame and budget. Secondly, QLASSIC is designed with another two objectives, they are to appraise the performance of contractors based on quality of workmanship and to collect data for statistical analysis.ScopeIn general, stove has been defined as the area or extent of an activity (Kernerman slope Multilingual Dictionary 2010). CONQUAS 21 and QLASSIC have set out their kitchen range or the covered area of the asses sment. Therefore, both of the quality assessment systems set out the standards for various aspects of construction work (BCA 2008). Assessment on the quality of workmanship is carried out based on the various construction elements in the project and marks awarded are then summed up to give a total quality score for the building project (CIDB 2006).QLASSIC (CIDB 2006) important elements to be covered in Quality Assessment System are as follows morphologic plantarchitectural kit and boodleMechanical Electrical plant lifeExternal plant lifeThe above mentioned components can be further humble into different items such as internal finishes, external finishes, roof, sanitary work, galvanizing work and so on. However, the plant life such as piling, heavy al-Qaida and sub-structure whole shebang which are hard equipment-based and called under separate contracts or sub-contracts are excluded.Undoubtedly, assessment is primarily based on workmanship standard through site inspection and field testing. Therefore, assessment on geomorphological work and ME working is carried out during the construction process, while for completed building project, assessment on architectural, ME fitting and external workings is executed to measure the quality of workmanship.Other than site inspection, test on the material and the structural performance of selected services and installation also will be included in the assessment. Those tests can protect the interest of occupants in term of safety, comfort and esthetical defects which will be surfaced only after some time.CONQUAS 21 (BCA 2008)Main components to be covered in CONQUAS are as followsStructural full treatmentArchitectural whole shebangMechanical Electrical worksThe above mentioned components can be further broken into different item such as internal finishes, external finishes, roof, sanitary work, electrical work and so on. However, the works such as piling, heavy foundation and sub-structure works which ar e heavily equipment-based, buried or covered and called under separate contracts or sub-contracts are excluded.Undoubtedly, assessment is primarily based on workmanship standard through site inspection and field testing. Therefore, assessment on structural work and ME works is carried out during the construction process, while for completed building project, assessment is only carried out on architectural work to measure the quality of workmanship.Other than site inspection, test on the material and the functional performance of selected services and installation also will be included in the assessment. Those tests can protect the interest of occupants in term of safety, comfort and esthetical defects which will be surfaced only after some time.ComparisonIt is seemingly shown that there are four components covered in the QLASSIC while three components for the CONQUAS 21. The only difference between them is QLASSIC has an superfluous component, which is External works. In fact, th e external work of CONQUAS 21 is grouped together with structural work.Due to the additional component of QLASSIC, there are slightly differences on the quality assessment. For better understanding, the following table shows the differences of the quality assessment between them.Table 2. Comparison of Components to be Tested Between QLASSIC and CONQUAS 21Components to be testedQLASSICDuring Construction processStructural works and Mechanical Electrical works.Completed BuildingArchitectural works, Mechanical Electrical works and External works.Components to be AssessedQLASSIC (CIDB 2006)For the QLASSIC, the assessment is divided into 4 componentsStructural worksStructural is always deemed as an importance element of whole building because it might incur grown amount of failure and prepare cost once it failure. Therefore, the assessment of structural work comprisesSite inspection of formwork, steel reinforcement, prefabricated or pre-cast elements, etc during construction.Laborato ry testing of compressive strength of concrete and tractile strength of steel reinforcement.Non-destructive testing of the cover and the uniformity of hardened concrete.Architectural worksArchitectural works are mainly deal with the finishes. The quality and standards of workmanship can be showed plain through the finishes.Floors, ceiling, window and door and internal wall, fittings and fixtures, external wall, roofs, driveway, apron and porch are works under architectural.Mechanical and Electrical (ME) worksThe quality of ME works is also important because it might impact the performance of the building once its failure and high cost is involve in rectification works and installation works as well. Electrical works, air-conditioning and mechanical ventilation works (ACMV), fire protection works, sanitary and plumbing works, lifts, escalator and other basic ME fittings are covered under the assessment.External worksLastly, the external works cover the general external works elements in building construction such as the link ways/shelter, drains, road works, car parks, footpaths, turfings, playgrounds, gate and fences, swimming pools, hardscapes and electrical substation.CONQUAS 21 (BCA 2008)For the CONQUAS 21, the assessment is divided into 4 componentsStructural worksStructural is always deemed as an importance element of whole building because it might incur big amount of failure and repair cost once it failure. Therefore, the assessment of structural work comprisesSite inspection of formwork, steel reinforcement, prefabricated or pre-cast elements, etc during construction.Laboratory testing of compressive strength of concrete and tensile strength of steel reinforcement.Non-destructive testing of the cover and the uniformity of hardened concrete.Architectural worksArchitectural works are mainly deal with the finishes. The quality and standards of workmanship can be showed obviously through the finishes. The assessment covers the followingSite inspection of f loors, internal walls, ceiling, window and door, fittings, roof, external walls of the building.Material functional tests such as window pissing-tightness, wet area water-tightness and adhesion of internal wall tiles. quickness of waterproofing for internal wet areas also included in the process of assessment.Mechanical and Electrical (ME) worksThe quality of ME works is also important because it might impact the performance of the building once its failure and high cost is involve in rectification works and installation works as well. Electrical works, air-conditioning and mechanical ventilation works (ACMV), fire protection works, sanitary and plumbing works, lifts, escalator and other basic ME fittings are covered under the assessment. The stages of the assessment includeSite inspection of installed works before they are secret such as the concealed pipesSite inspection of final installed works such as the Air-Handling units (AHU), cooling system tower, fire alarm control pa nel, etc.Performance tests on selected works such as earthing test, dry riser test and water pressure test, etc.ComparisonThe components of CONQUAS 21 and QLASSIC are quite similar. However, there is only one difference, it is CONQUAS 21 does not have external works. In fact, the external works was grouped together with structural works.The following tables are the comparison of sub-components to be assessed between QLASSIC and CONQUAS 21Structural worksTable 2. Comparison of Sub-Components to be Assessed between QLASSIC and CONQUAS 21 (Structural Works)Sub components to be assessedQLASSICCONQUAS 21Part 1 Reinforced Concrete StructuresFormworkReinforcement (Cash in-situ and Precast) finished Concrete (Cash in-situ and Precast)Precast Specific RequirementsStructure QualityNon-Destructive testingPart 2 Structural Steel WorksMain section/ Partial Assembled ComponentMetal DeckingErection TolerancesCorrosion and Fire safeguardWelding Test ReportsPart 3 Pre-Stressed ConcreteCondition o f Tendons AnchoragesInstallation of SheathingStressing Grouting ProcessDebondling(Source CIDB 2006 and BCA 2008)Architectural worksTable 2. Comparison of Sub-Components to be Assessed between QLASSIC and CONQUAS 21 (Architectural Works)Sub-components to be assessedQLASSICCONQUAS

Friday, March 29, 2019

Workplace Monitoring Surveillance And Workplace Privacy Information Technology Essay

Work tell Monitoring Surveillance And Work plaza solitude Information Technology EssayToday business is being conducted electronic on the wholey beca theatrical role profit access in every functionment has fail a business necessity. The internet, social net hitings, e-mail, websites, forums, wikis, blogs, and instant massaging argon the essential tools that an employee routines to communicate, collaborate and to do research work. But, these resources could be mis apply for private and illegal activities.As we every know the majority of all employers supervise employee arrival and departure time. almost every memorial tablet, cash has been handled accurately. The majority monitor accuracy and quality of on that point employees work. Each and every employer expects maximum productivity from there employees. The employers think that the observe is non unreasonable monitor is comm tho accepted as a business requirement. Still large derive of organizations they do not moni tor the sort in which the players practice there calculators. The improper use of calculator tools can receive serious threats for an organization.In a entropy processing system sensual business environment lost of productivity wont be the solo issue that an employers face how much time do they spent for none cerebrate activities? For instance, how much time were employees surfing the internet? What do they do during there time online? Play games, look for the perfect partner? How much none related emails that they got and send? By doing numerous none related work they waste valuable the time of the employees and ne 2rk bandwidth of the company just abouttimes, employees nonplus internal confidential randomness and assumeive schooling and use them for illegal purposes. Therefore, the supervise in this regard should be highly considered. in-person surfing has become a nuisance for employers. Employees utilize electronic computer tools for there leisure and joy deep down the normal working hours. A survey revealed that in an organization the lost time of an each employee is around 2.5 hour per worker. With the use of the chip of work force and the hourly pay rate the total employee live of cyber lacking could be estimated and it was a considerable amount. One of the security company, Sophose reveal 60% of its uses accessed the social electronic networking site, Face Book during the working hours. And that more than 25% of its uses accessed the site more that 10 times each day during working hours Employee Computer PC Activity Monitoring Solution. Around the world well-nigh there argon fifty million Face Book users per day. And this number is increasing by 200,000 per day. How many cyberlackers be there in your organization and how much do they costing? The an early(a)(prenominal) measurable matter to be interpreted to consideration is Intellectual Property Theft (IPT). Interconnected computers and runny instruments provide late o pportunity for people for access and steal data. These data could be conveyed to a laptop or a flash drive. mass murder Mellon Universitys software engineering institute has found 75% capital IPTs were make by internal machines in the rung. In recent case a research chemist has being admitted to stolen $400 Million worth of situation data from his former employer DUPOINT Employee Computer PC Activity Monitoring Solution. fallacious often has access to very confidential nurture which can be misused by the employee or s obsolete to a third party. It is declared that HSBC guest face-to-face accounts were stolen up to $500,000 after the HSBC employee passed on data in to a criminal associate. Employee Computer PC Activity Monitoring Solution.Employers progress to some form of legal li faculty and accountability for the actions done by there employees. According to the institute of e-policy, a considerable constituent of employers were prosecuted by courts due to improper use of electronic mail and web ground technologies Employee Computer PC Activity Monitoring Solution.Therefore, monitor employee activities is not a universal remedy to the above problems discussed. Introduction of Effective supervise with an electronic policy could be implemented as a part of a risk management strategy.Computer Monitoring and Electronic Monitoring is chop-chop to growing readably in world business. The technologies digest become more powerful and uncomplicated today. It is inexpensive to install and maintain. Therefore, the rate of electronic observe in developed countries has attachd considerably. In United States in 1999 the percentage of employer who electronically monitor there workers was 67%, in 2001 this number has increase to 78% by 2003 92% of employers were conducting some type of work place observe National Work make ups Institute. This rapid growth of monitoring could be undo any sense of privateness as we know in American work place.In Srilanka th e government embarked ambitious program that establish email and internet all government sector organization in 2003. beneath this program they are equipped with a computer and a spacious access to online environment has raised numerous hiding related questions for twain employers and employees. In particular issues of email and internet enjoyment and employee monitoring in the work place is an important matter to be taken in to consideration. And also issue of electronic surveillance in the work place has an impact on employee seclusion rights.There are four categories of usage in organizations. Sending and receiving email, accessing and posting documents on the World Wide meshwork (WWW), sending and retrieving computer files which is known as File Transfer communicatings protocol or FTP and joining electronic discussions such(prenominal)(prenominal) as parole groups internet related chat groups. Email is a widely used internet service although many users are active in all categories. We could listen two interest parties exist in an organization and two competing interests in the employment context. The employers right to conduct business in a self determination manner and the employees secretiveness interests or the right to be let alone.For employer and managers, employee monitoring is a necessity. It has been argued that email and internet monitoring in a work place are the most effective method acting to reassure a safe and secure working environment and to entertain employees too. In addition to that, some argue with that monitoring may advertize efficiency, productivity, customer service and allow more accuracy to evaluate employee mathematical operation DeTienne, 1993. Different types of monitoring systems could be implemented by the managers in there particular organizations. In a computer establish work place employee key stroke speed and accuracy is commonly monitored by the employers. an other(a)(prenominal) electronic devices such a s photo surveillance which detects employee theft and employee safety. sleuthing is a detective tactic. When there is suspicious activity within the organization, they use systems for tapping of phone calls, the frequency of phone calls and Badge system to locate the employee within the working hours.It is argued as to whether employee monitoring is advantages to the employee. Advantages could be identified a few in number, comparing to the number of disadvantages. Electronic monitoring is beneficial for the employee because it provides naive method of public presentation evaluation and vetos interferences of managers feelings in an employee review. Data breeding self-possessed by the electronic system offers uniform and accurate feedback on the by performance. Therefore electronic evaluation system would be the best performance appraisal based on the quality and quantity and accuracy of an employees material work, rather than managers opinion. Where there are computers and electronic monitoring is available it provides flexible in-work locations convenient. Working hours by allowing employees to telecommunicate or use system available from the employerThe advantages as well as the disadvantages are important to employees because advantage is subservient to employees disadvantages due to monitoring crates shun influence to the benefits of an employee. Some of the employers do monitoring by using police cost methods for better productivity and a good customer service. But the employers, those who really use modern methods to exerting inhibit and power over employees. Electronic technology which uses for monitoring has made it easy of collecting private-data information that could be used negatively against the employees character or behavior and to take unfair decisions to harass the trouble maker and the alliance organizers within the organization. Fairness in how monitoring is implemented has to be considered. Whether the standers are reviewed as reasonable, the information collected should be work related and important for the employees quality of work life of day-to-day life and not other than anything else Levy. M, 1994.In this computerized world, where information and data are the most valuable consumer goods. Personal data is the life of the pertly economy when the process of information exchanges. For some businesses information is money and for this reason they buy and sell information derived from in the flesh(predicate) data. In the same way for some governmental and military organizations information and data are for their security purposes, for this reason, they manipulate personal data and information in the name of safety and public security. In both cases we could see that an person or groups do not have always ability to control the flow of there personal information and data and are unable to determine for themselves when, how, and which personal information should be shared with others.Although inform ation technology is related to solitude violation, that the privacy is not a sunrise(prenominal) issue. It is not computes invade privacy but people who have the tendency in many ways to invade the privacy of others. Presently privacy problem seems become even worse, and information technologies such as network database, digital and tele cameras, microphone transmitters and monitoring hardware devices and software programs. The aim of these technologies to select different kind of data information for various purposes. However sometimes personal information and data is maintained without the permission of the individual and personal data travel on the super high way oblation invaluable information and details to various parties from marketing companies to government agencies. insane asylum of electronic surveillance and monitoring in an organization, defecate unnecessary filter and pressure on them. Under these conditions heavy workloads and repeating functions leads them to s ocial isolation and loss of job satisfaction. Under this type of working conditions a assume revealed, that monitored employees suffered from physical and psychological health problems Levy, 1994.Employers today, depending the business they do, generally conduct monitoring in there organizations in order to increase productivity and customer care. Most of the employers initiate electronic monitoring which results devastating to employee privacy. Employee monitoring systems oft record personal talks while at work. Internet monitoring is very invasive especially in a computer environment. It would be easier to communicate through internet than on there office bid or email. Most invasive of all is video monitoring. These confidential video cameras installed in every were of the work place or factory such as locker rooms and bathrooms and there stoles. Some employers dont know when and what they are being monitored or watched. Some employees know that they have a trite employer w ho reserves the right to monitor anything at any time. While other employers do not know whether it is there email, voicemail, web access or hard drive or whether they are being monitored at all. Therefore, it is figure out that the privacy at the work place is at a risk. Therefore, onward initiating a program of monitoring employers carefully should consider effective solutions other than monitoring.Business field should have properly trained managers who are suitable to deal with sensitive employee subjects. Supervising staffs can set conduct guidelines, administer concerns, mediate complaints as well as monitor deal with those employees that charter to abuse company resources.Business should always conduct as in-house judgment to identify whether electronic monitoring is even necessary.Management should speak with employees regarding the productivity problem. Employee may suggest alternative ways to solve the problem if monitoring is chosen employee may participate designin g the monitoring program.If monitoring is conducted the range must be as narrower as consistent with achieving the particular objective.If the company chooses to adopt electronic monitoring, notice should be given in assign of any monitoring. This notice specifically state what would be monitored and when this would occur.Protection of employees privacy by law is more important where monitoring is conducted. Therefore, to develop a privacy policy in the workplace, an ethical involvement in computer monitoring and work place privacy has to be taken in to consideration.Computer ethics deals with the balance mingled with employee rights and employer interests and development of an effective employer use policy. On a practical basis any computer based organization can draw upon a code of ethics or policy should implicate the pursuance theoriesThe Law which include moral principals include with negative consequences for noncompliance.Code of practice guidelines for employers to w ork within the organization.Professional morals Guidelines to employers/ managers to work within the organization.Personal Ethics Values that influence actions of the individualMonitoring mechanism is very important to employees for many reasons. Failure, to inform and advice the employees that the computer based activities volition be monitored maybe a violation of employee privacy rights according to the certain judicators. If the employees have been notified that they are being monitored they will be compelled to prevent from breaching the AUP (Acceptable Use Policy). Furthermore undisclosed monitoring would bring negative impact on employee moral.Therefore following steps could be taken to formulate a acceptable use policy (AUP).An AUP should be communicated to staff of the organization in writingPermitted and prohibited activities should be setout for the usage of e-mail, internet and other applications.Specify the disciplinary actions that will be taken for the noncompli ance for the AUP.Employer should notify that they are being monitoring and when and what will be monitored.Although both employer and employee should stick to this AUP, there may be particular that could be unexpected monitoring is taken place. But such action should be taken, only after a legal advice. It is advised that an AUP should be supported with worker educational programs too and in these educational programs it should be discussed on the following topics.The necessity of an AUP?That compliance should be compulsoryThe conditions applicable in the AUPThe consequences to disobedienceThe extent of monitoringWho should consult with any questions about the AUPIn this manner employer and employee relations could be established and maintained, industrial peace and the privacy rights of the employee will be secured to create a computer based environment which would raise production and productivity. That would lead to economic development.The educational program will not only edu cate the AUP to workers and ensure compliance it may also disclose of good codes of practices within a social framework and entering them in to legal process. In the contrary, it may provide a defense against law suits by enabling an employer or an organization to demonstrate that all responsible for(p) steps were taken to ensure that the work place is free from anguish and all efforts were taken to provide maximum achievable vindication for employee privacy rights and to maintain the workplace privacy rights of the employees in the organization.Taking in to privacy violation, in the information society it is important to discuss about the right of privacy to some extent. Communication privacy includes privacy of email, teleconference, voice telecom and postal mail. Information privacy determining the purpose of use and communication of personal information with others. It consists of rules including rule and industrial codes concerning with the ingathering, providing data o n request, calve about selective information or personal data such as credit information and medical and governmental data information and records. With regard to computer ethics, communication and data communication privacy are the main concern.Method of privacy violation in the data communication and technology sector could be classified in to the following categories, misdemeanour wrongful entry of acquiring procession of property belongs to another and by extension, violation of privacy.Misuse of data information illegal use of information for unauthorized activitiesInterception of information unauthorized access to private information by a third party to a private communication.Data twin(a) data combined, linked and compared from two of more unrelated databases to create new information. The purpose of data matching is to regain statistical information, or create computer profiles. This data matching is used for instance, by security agencies to listen wanted criminals, terr orists or missing persons or by tax agencies to receive out illegal earnings and tax defaulters.Data mining the collection of masses of data into one or more data bases in order to get new information and knowledge that was previously hidden and unidentified. It is used in direct marketing, allowing marketers to combine various criteria taken from databases to direction on a specific target group.Stamallos.G, 2007According to the above possible methods of privacy violation, databases, networks do a major role therefore, what can be done to protect individual personal privacy? Some of the governments have tried to protect personal data through special legislations or privacy guidelines.In 1998 OECD (Organization for Economics Corporation and Development) ministers adopted the declaration on the protection of privacy on global networks in order to ensure the respect of important rights, build confidence in global networks, and prevent unnecessary restrictions on transborder flows of personal data.UK parliament published the data protection act of 1998 which protects the personal data of an individual (Stored in either digital or paper form) from unreasonable or illegal use.The Australian national Government the OECD guidelines with privacy act in 1988.The US privacy legislation seems to be a special one but more belatedly the US privacy legislation has supplemented two major laws on the use of personal data. One is the privacy act of 1994 and the other one is the computer matching and privacy protection act of 1998.Stamallos.G, 2007.It is very clear that old common laws do not really cover the area of work place privacy in many countries. Therefore, a gap exists between the times when a new communication technology is created new laws have to be designed by the state legislature to cover the new technologies and to protect the work place privacy as well.

Thursday, March 28, 2019

Comparing Black Boy and Their Eyes Were Watching God Essay -- comparis

smuggled Boy and Their Eyes Were honoring theology After World War I, Harlem became known for the sudden emergence of literature, field of study and music attributed to the migration of African Americans from the South and other cities. two Zora Neal Hurston and Richard Wright emerged as authors this time, this, however, should non be the sole basis for comparison of their writing as writers themselves. both(prenominal) Wright and Hurston had different agendas as writers and it is not as important to note their facts of life and backgrounds, but their audiences and the reason that drove them to write. Zora Neal Hurston was born in Eatonville, Florida, an all subdued community in 1891. She is known mainly for her novels, but she was also an anthropologist and folklorist. She canvas under Franz Boas while at Barn bed College and conducted fieldwork in Harlem. This is important because it held her to systematically draw and study the legends, myths and dialect of her info rmants. Boas stressed that no culture is superior to some other(prenominal) and cultures should be analyse equally. Hurston was criticized for using dialect, being a sensual writer and writing for the mainstream (white) society. Her writing was unlike Wrights, whom Henry Louis Gates, Jr. calls Hurstons dominant dreary male contemporary and rival (188). Richard Wright was born in 1908 in multiple sclerosis and describes his childhood an autobiographical novel he published in 1945, discolour Boy. Wright grew up in the racially charged South and sought to snuff out the physical hunger he has felt since his father abandoned the family and the phantasmal hunger that he was unable to find even though his naan was very religious. This hunger, whether tangible or not, led him on a journey... ...cs such as goodness, humility, love, or kindness. His writing can be interpreted as a call to arms at a time when he felt Blacks were apathetic to the problems facing Blacks. The wide scop e of these two writers shows how labels ar used to categorize people, thus creating a stereotype. Works Cited Gates,Henry Louis Jr. Afterward. Zora Neale Hurston A total darkness Way of Saying. Their Eyes Were notice god by Zora Neale Hurston. 1990 ed. Hurston, Zora Neale. Their Eyes Were watching God. New York Perennial Library, 1990 ed. Walker, Alice. In Search of Zora Neale Hurston. Ms. (March 1975) 74-79, 85-89. Ward, Jerry W. Jr. Introduction. Black Boy. 1998 ed. Washington, bloody shame Helen. Foreword. Their Eyes Were Watching God by Zora Neale Hurston. 1990 ed. Wright, Richard. Black Boy (American Hunger) A Record of Childhood and Youth. 1998 ed. Comparing Black Boy and Their Eyes Were Watching God Essay -- comparisBlack Boy and Their Eyes Were Watching God After World War I, Harlem became known for the sudden emergence of literature, field of study and music attributed to the migration of African Americans from the South and other cities. Both Zora Neal Hurston and Richard Wright emerged as writers this time, this, however, should not be the sole basis for comparison of their writing as writers themselves. Both Wright and Hurston had different agendas as writers and it is not as important to note their reproduction and backgrounds, but their audiences and the reason that drove them to write. Zora Neal Hurston was born in Eatonville, Florida, an all stark community in 1891. She is known mainly for her novels, but she was also an anthropologist and folklorist. She studied under Franz Boas while at Barnared College and conducted fieldwork in Harlem. This is important because it held her to systematically gain vigor and study the legends, myths and dialect of her informants. Boas stressed that no culture is superior to another and cultures should be studied equally. Hurston was criticized for using dialect, being a sensual writer and writing for the mainstream (white) society. Her writing was unlike Wrights, whom Henry Louis G ates, Jr. calls Hurstons dominant sullen male contemporary and rival (188). Richard Wright was born in 1908 in manuscript and describes his childhood an autobiographical novel he published in 1945, Black Boy. Wright grew up in the racially charged South and sought to annihilate the physical hunger he has felt since his father abandoned the family and the unearthly hunger that he was unable to find even though his granny was very religious. This hunger, whether tangible or not, led him on a journey... ...cs such as goodness, humility, love, or kindness. His writing can be interpreted as a call to arms at a time when he felt Blacks were apathetic to the problems facing Blacks. The wide scope of these two writers shows how labels are used to categorize people, thus creating a stereotype. Works Cited Gates,Henry Louis Jr. Afterward. Zora Neale Hurston A blackamoor Way of Saying. Their Eyes Were Watching God by Zora Neale Hurston. 1990 ed. Hurston, Zora Neale. Their Eyes Were Wa tching God. New York Perennial Library, 1990 ed. Walker, Alice. In Search of Zora Neale Hurston. Ms. (March 1975) 74-79, 85-89. Ward, Jerry W. Jr. Introduction. Black Boy. 1998 ed. Washington, bloody shame Helen. Foreword. Their Eyes Were Watching God by Zora Neale Hurston. 1990 ed. Wright, Richard. Black Boy (American Hunger) A Record of Childhood and Youth. 1998 ed.

Personal Narrative - Christmas Memory Essay -- essays research papers

Christmas Memories Approaching Grandmas, our family anticipates the grand holiday ab out(p) to be rekindled once again. With our family and friends about to be reunited with distributively other, each family member is move not to notice how long the last kilometer is taking. The trees along the passage seem to crawl by slower as Dad pushes his break up harder. Inch by inch, Second by second, we approach the long wait destination. Finally when we arrive at Grandmas house our long journey is over. We each take a huge breath as we step out onto the crispy snow that snaps beneath our boots. The air is fresh and creates a boot down my spine. I make my way to the frost coated stand door, illuminated by the green and red Christmas lights. As I unclouded the door and step into a house full of cheek pinches and hugs, an straddle of Christmas odur engulfs me, and makes my mouth water. As I yell "HELLO" I pick up voices laughing, talking, and asking whos at the door? In the n ext second "Millions" of relatives atomic number 18 giving me there greetings and gladly inviting us into the house. As my family and I ar quickly made comfortable, I look around..... Plates full of Christmas pastries, Christmas decorations, and Christmas music thinly penetrates the air as the family socializes with each other. The constant murmer of the voices, serves as a stage setting for the music. My cousins are running making their laps around the living room darn playing t...

Wednesday, March 27, 2019

Symbolism In Macbeth Essay -- William Shakespeare

In William Shakespeares Macbeth, symbolism plays a prominent role to emphasize the theme of degeneration of power. Throughout the play there are several main symbols repeatedly used to emphasize this theme. The contrast of light and dark representing good and evil, furrow representing unrighteousness, murder, and pain, and the archetypal pattern of purification by using water represents remotion of guilt, purgatorial and peace. Symbolism is used repeatedly to emphasize the theme of decomposition of power. The image of source plays an important role throughout Macbeth. subscriber line represents the murders that Macbeth had committed, the guilt that went along with the murders and the pain that it brought on him during his downfall. The soldier describes the violence and bloodshed, in the war between Scotland and Norway, Except they meant to bathe in reeking wounds. (I. ii. 43) foreshadows the violent reputation of the play filled with murder, guilt and pain. Blood in the mu rder of tycoon Duncan also plays a major role because it represents Macbeths guilt as wellhead as his shame for slaying King Duncan. Macbeth observes his blood stained custody and remarks As they had seen me with these hangmans hands. (II. ii. 28) This reveals his guilt and shame because he is comparing his hands to those of an executioners. after(prenominal) the murder, Macbeth refuses to return back to the bed chamber of Kind Duncan to smear the blood on the sleeping guards, because he is afraid that the blood will accuse him further. Lady Macbeth smearing the blood onto the guards represents them trying to rub their guilt off onto the guard. Ill rescript the faces of the grooms withal, for it must seem their guilt (II. ii. 73) but this proves to be ineffective because Macbeth abates up murdering t... ... a dark setting used which involved supernatural events, era the light setting was used for last battle, when Macbeth was slain at the end to show the restoration of peac e and honesty. Thus the symbolism of light and phantasm representing good and evil in the play emphasizes the theme of corruption of power.In conclusion, symbolism is used to emphasize a theme through repeating and imagery. It is used to emphasize the theme of the corruption of power due to Macbeths actions. Blood representing guilt, blood murder, and pain, the contrast of light and dark representing good and evil and the archetypal pattern of purification by using water representing removal of guilt, cleansing and peace are the main symbols used repeatedly to emphasize this theme. These symbols lay out the theme effectively to allow the audience to grasp and involve themselves into the play.